CMSC 628 - Presentation An End-to-End Approach to Host Mobility An End-to-End Approach to Host Mobility Alex C. Snoeren and Hari Balakrishnan Alex C. Snoeren.

Slides:



Advertisements
Similar presentations
An End-to-End Approach to Host Mobility Alex C. Snoeren and Hari Balakrishnan MIT Laboratory for Computer Science.
Advertisements

Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
資 管 Lee Lesson 12 IPv6 Mobility. 資 管 Lee Lesson Objectives Components of IPv6 mobility IPv6 mobility messages and options IPv6 mobility data structures.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Chapter 7: Transport Layer
Univ. of TehranComputer Network1 Special Topics on Wireless Ad-hoc Networks University of Tehran Dept. of EE and Computer Engineering By: Dr. Nasser Yazdani.
1 Mobile IP Myungchul Kim Tel:
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
ConnectionMigration 818L Network Centric Computing Spring 2002 Ishan Banerjee.
Computer Communication Digital Communication in the Modern World Transport Layer Multiplexing, UDP
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
MOBILITY SUPPORT IN IPv6
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
Anycast Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Mobile IP Polytechnic University Anthony Scalera Heine Nzumafo Duminda Wickramasinghe Edited by: Malathi Veeraraghavan 12/05/01.
1 IPv6 Address Management Rajiv Kumar. 2 Lecture Overview Introduction to IP Address Management Rationale for IPv6 IPv6 Addressing IPv6 Policies & Procedures.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Mobile IP. Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution? – mobile.
Mobile Networking Prasun Dewan Department of Computer Science University of North Carolina
Dealing with Mobility -- Mobile IP. References r J. Kurose and K. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, 2 nd edition.
Cisco Discovery Working at a Small-to-Medium Business or ISP CHAPTER 7 ISP Services Jr.
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
TCP Mobility/Splicing Francis Chang Systems Software Lab OGI.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Connection Migration: Why & How Hari Balakrishnan Networks and Mobile Systems Group MIT Lab for Computer Science Joint work with.
Cisco 1 - Networking Basics Perrine. J Page 19/17/2015 Chapter 9 What transport layer protocol does TFTP use? 1.TCP 2.IP 3.UDP 4.CFTP.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
IPv6 Mobility Milo Liu SW2 R&D ZyXEL Communications, Inc.
Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer
IP Security: Security Across the Protocol Stack
Univ. of TehranComputer Network1 Special Topics on Wireless Ad-hoc Networks University of Tehran Dept. of EE and Computer Engineering By: Dr. Nasser Yazdani.
1 Network Security Lecture 8 IP Sec Waleed Ejaz
 Protocols used by network systems are not effective to distributed system  Special requirements are needed here.  They are in cases of: Transparency.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
TCP/IP Vulnerabilities
Network Address Translation Current problems with IP addresses:  Address depletion  Scaling in routing Solutions:  IPv6  CIDR  NAT.
Understanding IPv6 Slide: 1 Lesson 12 IPv6 Mobility.
MOBILITY Beyond Third Generation Cellular Feb
Fine-Grained Failover Using Connection Migration Alex C. Snoeren, David G. Andersen, Hari Balakrishnan MIT Laboratory for Computer Science.
Spring 2004 Mobile IP School of Electronics and Information Kyung Hee University Choong Seon HONG
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
By Chris Zachor CS 650.  Introduction  SSH Overview  Scenarios  How To:  Results  Conclusion.
1 Review – The Internet’s Protocol Architecture. Protocols, Internetworking & the Internet 2 Introduction Internet standards Internet standards Layered.
Mobile IP 순천향대학교 전산학과 문종식
1 Pertemuan 23 Overview of Transport Layer Ports.
Network Layer Security Network Systems Security Mort Anvari.
Final Examination of Internet Communication Protocol.
An End-to-End Approach to Host Mobility By, Alex C. Snoeren and Prof. Hari Balakrishnan MIT Laboratory for Computer Science Presented by, Parag Namjoshi.
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
K. Salah1 Security Protocols in the Internet IPSec.
Cryptography CSS 329 Lecture 13:SSL.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Internet Protocol Version 6 Specifications
Introduction Wireless devices offering IP connectivity
Networking Applications
IT443 – Network Security Administration Instructor: Bo Sheng
PART 5 Transport Layer Computer Networks.
Chris Meullion Preston Burden Dwight Philpotts John C. Jones-Walker
Network Architecture Introductory material
2002 IPv6 技術巡迴研討會 IPv6 Mobility
Review of Important Networking Concepts
Unit – 2 TCP.
Advanced Computer Networks
Presentation transcript:

CMSC Presentation An End-to-End Approach to Host Mobility An End-to-End Approach to Host Mobility Alex C. Snoeren and Hari Balakrishnan Alex C. Snoeren and Hari Balakrishnan

Overview ► Introduction ► Mobile IP ► Other IP layer approaches to mobility ► Transport layer approaches ► Proposed architecture ► Issues ► Conclusions

Introduction ► Routing issue with legacy TCP/IP stack ► Host location and hand-off support ► End-End Vs other approaches ► Keeping mobility transparent from the transport layer

Mobile IP ► Essentially, mobility handled by ‘third party’ ► Triangle routing and tunneling ► Pure routing solution ► Only IP substrate changed

Other network layer approaches ► For the most part, enhancements of Mobile IP ► Cache care-of address of mobile host ► IPv6 mobility support

Transport layer approaches ► Migration NOT transparent to TCP ► Proxy approaches: transparent to sender ► Current approach

The End-to-End architecture ► Addressing ► Host location ► TCP connection migration ► Security

Host Location ► In case of fixed servers, no special service required ► In case of mobile servers, use dynamic DNS updates ► Set TTL of DNS cache entries to zero ► Problems with fast mobility

TCP connection migration ► Use secure tokens to identify TCP connections ► Token negotiated during handshake ► Migrate-permitted option to negotiate token ► Migrate option to migrate a connection

TCP connection migration

► Migrate Permitted option

TCP connection migration ► SYN from client contains client’s public key ► Likewise for SYN from the server ► Shared secret key computed from the above ► Token computed as a hash of the shared key and initial sequence numbers

TCP connection migration ► Migrate option

TCP connection migration ► Migrate option used in the SYN after migration ► ReqNo used to order migrate requests ► Token identifies the connection ► Request is an authentication mechanism ► Essentially, hash of the initial sequence numbers, shared key, request number, and the migrate SYN segment

TCP connection migration ► At the other end, compare token ► Check if ReqNo is one greater than prev ► Compute request hash and compare ► Update destination address and port ► The Migrate-Wait state

Security ► Denial of Service ► Connection Hijacking ► Key security

Performance

Limitations ► Slow start begins after migration ► Both hosts cannot move simultaneously ► Address caching

Conclusions ► End-to-End architecture ► Transport layer aware of mobility ► Hosts have choice over approach used, hence more flexible ► Pretty secure ► Some limitations